Hiding Data Sources in P2P Networks
Marek Klonowski, Miroslaw Kutylowski, Bartlomiej Rozanski
We propose a peer-to-peer (P2P) architecture where the identity of nodes
holding data remains hidden, but the information itself can be
efficiently fetched. This architecture can be used to protect P2P
networks against malicious attacks towards nodes holding important data.
In particular, our protocol can be used for maintaining access to
revocation lists, blacklists and similar data, which is of growing
importance for modern P2P protocols.